Author of the publication

An Overview of Power Analysis Attacks Against Field Programmable Gate Arrays.

, , , and . Proceedings of the IEEE, 94 (2): 383-394 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

XTR Implementation on Reconfigurable Hardware., , and . CHES, volume 3156 of Lecture Notes in Computer Science, page 386-399. Springer, (2004)An Overview of Power Analysis Attacks Against Field Programmable Gate Arrays., , , and . Proceedings of the IEEE, 94 (2): 383-394 (2006)Towards Security Limits in Side-Channel Attacks., , , and . IACR Cryptology ePrint Archive, (2007)Parallel FPGA Implementation of RSA with Residue Number Systems - Can side-channel threats be avoided? - Extended version., , , and . IACR Cryptology ePrint Archive, (2004)From New Technologies to New Solutions - Exploiting FRAM Memories to Enhance Physical Security., , and . CARDIS, volume 8419 of Lecture Notes in Computer Science, page 16-29. Springer, (2013)Towards Security Limits in Side-Channel Attacks., , , and . CHES, volume 4249 of Lecture Notes in Computer Science, page 30-45. Springer, (2006)SoC security architecture: current practices and emerging needs.. DAC, page 144:1-144:6. ACM, (2015)Power and electromagnetic analysis: Improved model, consequences and comparisons., , and . Integration, 40 (1): 52-60 (2007)Template Attacks in Principal Subspaces., , , and . CHES, volume 4249 of Lecture Notes in Computer Science, page 1-14. Springer, (2006)Updates on the Security of FPGAs Against Power Analysis Attacks., , , and . ARC, volume 3985 of Lecture Notes in Computer Science, page 335-346. Springer, (2006)